Not specified
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Job Category:
Systems Engineer
(This job is no longer available)
Knowledgent Group | Newark, NJ
Grad Date

Not sure what types of jobs you are interested in?

Explore Jobs
Based on Your Education

Follow This Company

Job Description

Systems Engineer (Warren, New Jersey)

Qualified candidate:

  • Master's of Arts degree Computer Applications/Science.
  • 1 year experience in System/Software/Data Engineering.
  • 40 hours/week.
  • Design, develop, implement Big Data platforms & infrastructure.
  • Convert business problem to data drive analysis.
  • Import/export data. Use Hadoop.
  • Travel required 50% of time.

recblid dz9ps1b6miu2zhxqxtlukjvye7uomk

About Knowledgent Group

KCG's Enterprise Security Operations & Maintenance service offerings focus on the technologies and processes required to properly secure the Enterprise Infrastructure utilizing a Defense-in-Depth approach. KCG understands the importance of proper design, management, and maintenance of an organization's security environment to protect information assets from both external and internal threats. The proper configuration of technologies combined with applicable access controls and processes help prevent and identify unauthorized use and provide subsequent protection of information assets. KCG's overall security strategy allows an organization to understand its overall risk exposures, and prepare a security plan to mitigate those vulnerabilities. KCG's service offerings in the area of Enterprise Security Operations and Maintenance include: Network Security Architecture Design and Implementation Firewall Maintenance and Log Analysis Intrusion Detection System (IDS) Management and Analysis Incident Handling Including: Real-Time Incident Management, Hacker Attempts, Classification Spillage, Malicious Code Outbreaks, Inappropriate Use, etc. Enterprise Anti-virus Deployment, Integration, and Management IAVA Compliance Patch Management (SUS, SMS) Access Control Lists and Group Policies Return to Top Account management (PKI, CAC, etc.) Information Security Strategy and Policy Development KCG understands that an Information Security Program can not be successful without defining specific short and long term goals, as well as an overall execution strategy for achieving those objectives. KCG assists clients in determining Information Security priorities and identifies areas of high risk in order to develop comprehensive strategic plans for enhancing Information Security Programs. KCG also understands that mature Information Security Programs have well-defined security policies supplemented by documented Standard Operating Procedures. KCG engineers assist in defining required security policies and in developing and updating these policies based on industry and agency approved guidelines. In addition to implementing security policies, KCG provides support in education and awareness programs to ensure that an organization's user community is familiar with security policies and to ensure that the organization follows good security practices on a daily basis. KCG believes that a comprehensive security program is only as good as the user community's adherence to sound security practices. KCG's specific areas of focus in Information Security Strategy and Policy Development include: Information Security Policy Development (password, wireless, inappropriate use, firewall, IDS, trusted downloads, remote access policies) Insuring compliance with applicable over-arching standards/guidelines (DOD 8500 series, DOJ 2640, etc.) SOP development to enforce/regulate Security Policies Return to Top Information Security Education and Awareness (new user training, annual refresher training, security Tip of the Day, etc.) Certification and Accreditation KCG assists clients in navigating the often confusing and conflicting world of Certification and Accreditation (C&A) by providing years of experience working with and tailoring enterprise-wide C&A standards and guidelines. KCG focuses on translating these standards to define the processes, steps, and deliverables required to achieve and maintain a positive accreditation decision and Authority to Operate (ATO). KCG has significant operational experience in providing certification and accreditation services to government sector clients in accordance with DITSCAP, NIACAP, DCID 6/3, FISMA, and NIST 800 series standards. KCG works closely with stakeholders and infrastructure team members to ensure an organization's networks, systems, facilities, and programs reach an acceptable level of information security to obtain and maintain ATO certification. KCG's service offerings in this area include: Certification and Accreditation support following DITSCAP, NIACAP, DCID 6/3, NIST 800 series, and FISMA regulations System Security Authorization Agreement (SSAA) and System Security Plan (SSP) development and maintenance Certification and Accreditation support to reach Authority to Operate (ATO) Security Test and Evaluation (ST&E) Plan Development ST&E Execution procedures and Test Analysis Reports Return to Top Perform vulnerability assessments compliant with over-arching regulations to ensure continued Accreditation compliance Vulnerability Assessments KCG's Vulnerability Assessment capabilities combine operationally proven methodologies with dedicated, experienced professionals to provide a comprehensive solution to an organization's risk assessment requirements. Our methodologies and approach are based on assessing system risks and prioritizing their criticality based on an analysis of threats, in concert with the accurate characterization of the business and data sensitivity requirements of the organization. KCG's Vulnerability Assessment services enable an organization to obtain an immediate and accurate understanding of the critical threats to the existing infrastructure while providing a detailed roadmap for prioritizing, addressing, and mitigating risks. KCG's service offerings in this area include: Develop Vulnerability Assessment plan Develop System Characterization Report documenting system criticality, interconnectivity of systems, system relationships, criticality of data, etc. Execute Vulnerability Assessment Plan using various COTS and open-source vulnerability assessment tools and KCG's internal Tool Kit incorporating various internally developed technologies, processes, and scripts. Document Vulnerability Assessment results based on NIST 800 series regulations and format Validation of internal assessment findings Develop and Implement Remediation Plans Return to Top Work with Vulnerability assessment tools (ISS Internet Scanner, nessus, eEye Retina, auditing tools such as ArcSight, e-Security, etc.) Business Continuity Planning KCG understands the significance of sound Business Continuity Planning (BCP), and is experienced in providing these services to ensure that a business can continue to operate in the face of disaster. KCG's BCP methodology consists conducting a business analysis to understand the potential impacts of a disaster or disrupting event. Once these impacts are understood, a risk analysis is performed to understand the likelihood of each scenario or event. The risk analysis becomes the basis for the Disaster Recover (DR) Plan, and gives emphasis to the scenarios that are most likely to occur while keeping the worst-case scenario in mind. Creating a comprehensive DR Plan can be an enormous and complex task, and is often overlooked or understated within an organization. KCG appreciates the importance of a sound plan to ensure adequate protection of organizational assets, and develops DR plans with detailed policies and procedures that can be used for a wide range of recovery scenarios. The plan also provides procedures for returning to normal operations, and provides post-event guidelines for implementing lessons learned from each event to improve future disaster response. Another critical component of BCP is to ensure that the infrastructure is adequate to deliver the anticipated level of service in the event of a disaster. KCG has significant experience in providing architecture design, engineering, and implementation services to ensure system reliability and redundancy, backup and recovery functionality, and is also adept at facility design and build-out to enable these disaster recovery capabilities.